Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Endpoint

Below you will find reports with the tag of “Endpoint”

image from HTTPS/SSL White Paper

HTTPS/SSL White Paper

For many organizations, dealing with HTTPS traffic is something of a double edge sword. Recent moves to encryption challenge the status quo in terms of organizational oversight. Finding a balance between competing interests will be critical to moving forward, but while present technology limitations hamper those efforts, technological advancements can enhance them.

(more available)
Added: October 15, 2018
image from Just in Time Research: Data Breaches in Higher Education

Just in Time Research: Data Breaches in Higher Education

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this research analyzes data breaches attributed to higher education. The results from this review will be used to inform EDUCAUSE research, programs, products, and services.

(more available)
Added: October 15, 2018
image from Leadership Compass: Cloud Access Security Brokers

Leadership Compass: Cloud Access Security Brokers

How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for Cloud Access Security Brokers and a compass to help you to find the product that you need.

(more available)
Added: October 15, 2018
image from Mobile Banking Applications: Security Challenges For Banks

Mobile Banking Applications: Security Challenges For Banks

Accenture and NowSecure, Inc. analyzed the mobile banking app threat landscape based on industry research, customer-facing mobile banking app vulnerability assessments performed by NowSecure, and Accenture’s industry knowledge and experience working with banking institutions. They collaborated to create a report that was designed to provide an understanding of the current- state security environment for customer- facing mobile banking apps, as well as answer some key questions about the state of mobile banking app security.

(more available)
Added: October 15, 2018
image from Mobile Security Index 2018

Mobile Security Index 2018

This paper discusses what organizations fear and what security measures they are taking to mitigate risks. To find out, they commissioned independent research, surveying more than 600 mobility professionals. The results were eye-opening.

(more available)
Added: October 15, 2018
image from Moving Beyond The Password: Consumers' Views On Authentication

Moving Beyond The Password: Consumers' Views On Authentication

In this research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S. consumers who use online and/or mobile banking in January 2017 to better understand their attitudes toward and understanding of various authentication mechanisms.

(more available)
Added: October 15, 2018
image from Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

System designers have long struggled with the challenge of determining how to control when untrusted applica- tions may perform operations using privacy-sensitive sen- sors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors. Proposed research methods enable systems to infer the op- erations associated with user input events, but malicious applications may still trick users into allowing unexpected, stealthy operations. To prevent users from being tricked, we propose to bind applications’ operation requests to the associated user input events and how they were ob- tained explicitly, enabling users to authorize operations on privacy-sensitive sensors unambiguously and reuse such authorizations.

(more available)
Added: October 15, 2018
image from Privilege Security For The New Perimeter

Privilege Security For The New Perimeter

Security in an era of next-generation technologies, expanding digital footprints, and widely dispersed user bases requires a comprehensive hybrid approach, delivered through privileged access management (PAM).

(more available)
Added: October 15, 2018
image from Quarterly Threat Report:Third Quarter 2017

Quarterly Threat Report:Third Quarter 2017

This is Rapid7’s Quarterly Threat Report. In this report they sought to make a less chaotic picture of the events of the 3rd quarter of 2017.

(more available)
Added: October 15, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report May 2016

SecureWorks Threat Intelligence Executive Monthly Report May 2016

This report from May 2016 takes a look at a variety of threat events, and provides insight and solutions for those issues.

(more available)
Added: October 15, 2018
image from Security Response: Insecurity in the Internet of Things

Security Response: Insecurity in the Internet of Things

The Internet of Things is becoming and area of danger for security risks. This paper discusses the cyber security issues related to the internet of things, and discusses how people should be taking action to protect their devices.

(more available)
Added: October 15, 2018
image from Simplifying Mobile App Integration With SDKs

Simplifying Mobile App Integration With SDKs

If you’re looking for a paper that talks about Mobile App Integration, this paper is for you.

Added: October 15, 2018
image from State Of Privacy & Security Awareness In Retail

State Of Privacy & Security Awareness In Retail

This report provides data to help understand the need of helping employees understand PCI compliance in the retail industry.

Added: October 15, 2018
image from The State of Malware Detection & Prevention

The State of Malware Detection & Prevention

From the report, “We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks.”

(more available)
Added: October 15, 2018
image from Threat Advisory: iCare Leak

Threat Advisory: iCare Leak

This is a threat advisory for iCare Leak

Added: October 15, 2018
image from Trusted Access Report 2016

Trusted Access Report 2016

This paper takes a look at the current state of device security.

Added: October 15, 2018
image from 2016 State of the Endpoint Report

2016 State of the Endpoint Report

This annual study is conducted by Ponemon Institute to understand trends and changes in endpoint risk in organizations. An endpoint can include servers, desktops, laptops, smartphones, and even printers, ATMs and PoS devices. They surveyed 694 US IT and IT security practitioners who are involved in endpoint security in a variety of organizations.

(more available)
Added: October 14, 2018
image from 2017 Data Threat Report Global Edition

2017 Data Threat Report Global Edition

This report from 2017 is based on a survey conducted during October and November of 2016. They surveyed over a thousand senior security executives from across the globe, including from key regional markets in the US, UK, Germany, Japan, Australia, Brazil, and Mexico, and key segments such as federal government, retail, finance, and healthcare.

(more available)
Added: October 14, 2018
image from 2017 North America Online Fraud Benchamark Report

2017 North America Online Fraud Benchamark Report

Based on the results of a survey, this paper looks at key trends and challenges facing North American businesses seeking to find the right balance and discusses some of the approaches and tools that are available to help you deal with cyber-based fraud management.

(more available)
Added: October 14, 2018
image from 4 Critical Mistakes IT Security Professionals Must Avoid

4 Critical Mistakes IT Security Professionals Must Avoid

This report is a breakdown of mistakes to be avoided in the IT Seurity arena.

Added: October 14, 2018
image from A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

A Guide To The Security Of Voice-Activated Smart Speakers: An ISTR Special Report

This special report brought to you by the folks at Symantec, takes a hard look at the security issues that surround smart speakers.

(more available)
Added: October 14, 2018
  • ««
  • «
  • 49
  • 50
  • 51
  • 52
  • 53
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 22, 2025 00:08 UTC (build b1d7be4)